Preferred Language
Articles
/
jperc-638
Effect of using the active learning in the achievement of third grade intermediate students in mathematics and them tendency towards the study of its
...Show More Authors

Current research aims to find out:

  1. Effect of using the active learning in the achievement of third grade intermediate students in mathematics.
  2. Effect of using of active learning in the tendency towards the study of mathematics for students of third grade intermediate.

In order to achieve the goals of the research, the researcher formulated the following two hypotheses null:

  1. There is no difference statistically significant at the level of significance (0.05) between two average of degrees to achievement the experimental group who are studying the use of active learning and the degrees of the control group students who study in the traditional method in mathematics.
  2. There is no difference statistically significant at the level of significance (0.05) between two average of degrees students the experimental group who are studying using the active learning and the degrees of the control group students who study in the traditional method in measurement of the tendency towards the study of mathematics.

The research community consists of all the schools in the third grade students intermediate in the Maysan province, where the applied researcher experience. The researcher was selected randomly al-amani intermediate for boys and where there are three divisions of the third grade intermediate and was selected two divisions of which were distributed randomly into two groups, one experimental and the other control. The researcher equivalents between the two groups (experimental and control) In some variables such as (chronological age, previous average, achievement in mathematics, the degree of intelligence, educational level of parents).

The Scientific content included the first four chapters (groups, relationships, and applications/ real numbers/ analysis/ mathematical sentences) of the book Mathematics for the third grade intermediate approved for the academic year 2010-2011.

The researcher prepared two types of teaching plans, the first of the control group according to the traditional method, the second for the experimental group, who studied by the active learning strategies.  Has been prepared by the researcher to search tools are the achievement test and the measure of the tendency towards study of mathematics.

The results of research had been, there is a statistically significant difference in achievement test and measure of the tendency towards study of  mathematics in favor of the experimental group.

As a complement to research, the researcher formulated a number of recommendations and suggestions.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 28 2020
Journal Name
Tropical Journal Of Natural Product Research
Red Cell Distribution Width and Neutrophil-Lymphocyte Ratio as Markers for Diabetic Nephropathy
...Show More Authors

Diabetic nephropathy (DN) is the foremost cause of end-stage renal disease. Early detection of DN can spare diabetic patients of severe complications. This study aimed to evaluate the diagnostic value of red cell distribution width (RDW) and neutrophil-lymphocyte ratio (NLR) in the detection of DN in patients with type 2 diabetes mellitus (T2DM). This cross-sectional study included a total of 130 patients with T2DM, already diagnosed with T2DM. The albumin creatinine ratio (ACR) in urine samples was calculated for each patient, according to which patients were divided into two groups: with evidence of DN when ACR ? 30 mg/g, and those with no evidence of DN when ACR < 30 mg/g. According to multivariate analysis, each of disease duration (OR

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
2023 Ieee 36th International Symposium On Computer-based Medical Systems (cbms)
Toward a Minimal sEMG Setup for Knee and Ankle Kinematic Estimation during Gait
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sat Nov 01 2025
Journal Name
Journal Of Molecular Liquids
Chitosan salt as a dual-function agent for CO₂ sequestration and acidizing enhancement
...Show More Authors

The utilization of carbon dioxide (CO₂) to enhance wellbore injectivity presents a cost-effective and sustainable strategy for mitigating greenhouse gas emissions while improving reservoir performance. This study introduces an environmentally friendly method employing a water-soluble chitosan salt (CS) that generates a carbonated-rich acid solution upon contact with dry CO₂ at 25 °C and 508 psi. CS solutions (100–2000 ppm) were prepared and evaluated for CO₂ uptake, acid generation, and rheological behavior. Results show that 1000 ppm achieves an optimal CO2 uptake (2612 mg/l), with moderate viscosity increase (from 1.52 to 3.37 cp), while higher concentrations exhibit a sharp rise due to polymer-like network formation. Core floodi

... Show More
View Publication
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SYNTHESIS NEW LIQUID ELECTRODES FOR DETERMINATION DOMPERIDONE MALEATE BASED ON A MOLECULARLY IMPRINTED POLYMER: SYNTHESIS NEW LIQUID ELECTRODES FOR DETERMINATION DOMPERIDONE MALEATE BASED ON A MOLECULARLY IMPRINTED POLYMER
...Show More Authors

Liquid electrodes of domperidone maleate (DOMP) imprinted polymer were synthesis based on precipitation polymerization mechanism. The molecularly imprinted (MIP) and non-imprinted (NIP) polymers were synthesized using DOMP as a template. By methyl methacrylate (MMA) as monomer, N,Nmethylenebisacrylamide (NMAA) and ethylene glycol dimethacrylate (EGDMA) as cross-linkers and benzoyl peroxide (BP) as an initiator. The molecularly imprinted membranes were synthesis using acetophenone (APH), di-butyl sabacate (DBS), Di octylphthalate (DOPH) and triolyl phosphate (TP)as plasticizers in PVC matrix. The slopes and limit of detection of l

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
وقائع المؤتمر الدولي 7 للغة العربية / دبي
تقويم اداء اساتذة اللغة العربية العامة في كلية الادارة والاقتصاد جامعة بغداد من وجهة نظر طلبتهم
...Show More Authors

Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
تأثير تدفق القروض الخارجية في تحقيق التحولات الهيكلية لاقتصادات بعض دول الاسكوا للمدة (1990 ـ 2002)
...Show More Authors

تتطلب عملية التنمية الاقتصـادية في الدول النامية مبالغ كبيرة من رؤوس الأمـوال اللازمة لتنفيذ البرامج والخطط الاقتصادية، ولما كانت الاسـتثمارات التي تنفذها هذه الدول خلال حقبة معينة، تزيد على ما تم  تحقيقه من موارد مالية محلية، فلابد أنْ يمول الفرق من خلال انسياب صافٍ لرأس المال الأجنبي (قروض ومساعدات) إلى الداخل خلال المدة نفسها، لغـرض سَدّ الفجوة في المـوارد المحلية المعدة للاسـتثمار، وعانت بعض د

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Nov 11 2018
Journal Name
Arab Science Heritage Journal
تدهور تدهور التجارة وانخفاض عائدات الضرائب في ايران(1) خلال عهد الشاه سلطان حسين ( 1694-1722).
...Show More Authors

The weakness of the central rule at the reign of Shah Sultan Hussain who is regarded as the last Shah who governed the Safawi state near to its falling at the hold of Afghan in 1722 which is the main and the real factor for the economic collapse. The tribes of trade have faced stealing and robbery actions which have been compressed to a very big extent. This action was not the responsibility of Shah alone,

View Publication Preview PDF